PROFESSIONAL ACADEMIC STUDY RESOURCES WEBSITE +1 813 434 1028 proexpertwritings@hotmail.com
IT411 Unit 10 Lab and Written Analysis
Description
Last wee of course, final Lab Assignment
Unit 10 Lab: Mobile Forensics, Reverse Engineering in Linux, and Forensic Case Capstone
Outcomes addressed in this activity:
Unit Outcomes:
- Use FTK Imager in a forensic exam.
- Examine the shadow file.
- Brute force the hash of a password to obtain the password.
Course Outcome:
IT411-6: Investigate current practices and trends in digital and network forensics.
Purpose
In both the cloud and on-premises environments, Linux-based systems are ubiquitous targets for malicious actors. In this unit, you explore some of the techniques used by forensic examiners to evaluate Linux systems.
Part 1 Labs: Challenge – Mobile Forensics, Challenge – Reverse Engineering in Linux, and Forensic Case Capstone
Complete the labs “Challenge – Mobile Forensics,” “Challenge – Reverse Engineering in Linux,” and “Forensic Case Capstone” in the InfoSec Learning (ISL) environment located in Unit 10. Completion is automatically graded and posted to the Gradebook entry for the lab.
Part 2 Assignment: Written Portion Requirements
Mobile devices are used in our everyday lives. They include laptops, tablets, cell phones, smartwatches, and many other devices. Considering that we are walking around with small computers in our possession every day, we need to be more vigilant in how we approach security.
Answer the following:
- List at least five different mobile devices, and in 200 hundred words or more per device.
- Write about some of the security challenges each device presents that are unique from the others.
The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format.